authenticated security agreement


authenticated security agreement
A electronic security agreement between the debtor and the bank that is accepted by the borrower either by downloading the agreement into a personal database or by printing a copy. As an alternative to a security agreement physically signed by the debtor, the 2000 amendments to the UCC provide for an authenticated security agreement. American Banker Glossary

Financial and business terms. 2012.

Look at other dictionaries:

  • Security agreement — A security agreement is the contract that governs the relationship between the parties to a secured transaction (ie, the lender and the borrower). Under Article 9 of the Uniform Commercial Code (UCC), which governs secured transactions in the US …   Wikipedia

  • security agreement — An agreement between one or more debtors and one or more creditors in which the debtor grants the creditor an interest in the debtor s personal property as collateral for the debt. (Alternatively or in addition, the collateral may be property… …   Financial and business terms

  • Password-authenticated key agreement — In cryptography, a password authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party s knowledge of a password. Contents 1 Types 2 Brief history 3 See also …   Wikipedia

  • Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… …   Wikipedia

  • Transport Layer Security — (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e mail, Internet faxing, instant messaging and other data transfers. There are… …   Wikipedia

  • Network Security Services — Developer(s) AOL, Red Hat, Sun Microsystems, Oracle Corporation, Google and others Stable release 3.12.8 / September 23, 2010; 13 months ago (2010 09 23) …   Wikipedia

  • Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge …   Wikipedia

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • IEEE P1363 — IEEE P1363  проект Института инженеров по электротехнике и электронике (англ. Institute of Electrical and Electronics Engineers, IEEE) по стандартизации криптосистем с открытым ключом. Целью проекта было объединение опыта разработчиков… …   Википедия